Dne 24. 10. 22 v 20:18 David Conrad napsal(a):
Libor,
On Oct 24, 2022, at 9:11 AM, libor.peltan <libor.pel...@nic.cz> wrote:
The root of the DNS is a commons, supported by volunteers who are paying out of
their own pocket to provision a global infrastructure. I’m personally not
comfortable recommending techniques that can add undefined (could be minimal,
might not be: no one knows for sure) load to that infrastructure.
Well, the modern and well-configured resolvers will protect Root servers by employing
Aggresive Negative Caching or Root Zone Prefetch (and eventually Query Name Minimisation
for the sake of querier's privacy); outdated and broken resolvers will keep bombing the
root's auths with junk queries even if we declare they MUST NOT. As a consequence, those
arguments for this "MUST NOT" are moot.
We appear to be arguing about wording/capitalization.
I don't think so.
Obviously, simply saying “MUST NOT” in an RFC will have (and has always had)
zero effect on code behaviors. What matters is what people actually implement.
If a modern/well-configured iterative resolver/forwarder implements according
to (the potential future) spec (either “MUST NOT” or “should not”), then all
queries for .alt sent by outdated/broken stub resolvers will not bomb the root
as soon as the modern code is deployed. As applications/operating systems get
updated over time, even the stub resolvers could behave better. However,
implementation of code is all about priorities. I personally believe that, in
general, a spec that says “MUST NOT” has a slightly higher likelihood of being
prioritized over a spec that says “should not” but maybe that’s just me.
So far, the modern features like Aggresive Negative Caching and Root
Zone Prefetch (hereinafter: (*)) are already standardized and being
implemented by a (hopefully) raising fraction of resolvers. Do you think
that if we now standardize this explicit blockade of specific TLD for
resolvers, it will get implemented much faster and broadlier than (*)
and protect the Root zone in the meantime before (*) is implemented
sufficiently close-to-everywhere?
The real point here is #3 in the list I provided earlier:
"3) whether the inevitable leakage of .alt queries to the DNS represent potential
issues, and if so, should there be an effort to address those issues."
Using the AS112 project approach could help address the leakage to the root
issue (even for outdated/broken resolvers), although it wouldn’t generally
address the privacy leakage issue. It also has its own implications (e.g.,
delegating an explicitly non-DNS TLD in the DNS). Given the AS112 approach
doesn’t result in code change, would you be ok with using it with .alt?
I don't like neither lame delegation of non-DNS name in DNS Root Zone,
nor lame DNAME therein.
I would expect the correct approach is:
1) Put a proper MUST NOT into the piece of software that will be
responsible for determining DNS and non-DNS queries. It should prevent
query leakage into DNS as much as possible.
2) If it doesn't, the resolver should be able to avoid any lame queries
(not limited to .alt) to Root zone with the help of (*). We don't need
any RFC for this -- this already happens, and frankly: if Quad8
implements this, half of the problem is gone.
3) If it doesn't, the Root servers shall be solid enough to withstand a
stream of lame queries (not limited to .alt). We don't need and RFC for
this, this already happens.
On the other hand, I agree that an analysis of how heavily the Root
Server could potentially be impacted by stray .alt queries would be
beneficial for deciding if we need to implement a defense and how. But I
doubt this is possible to estimate.
Regards,
-drc
Libor
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop